You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

v111.go 11KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package v1_11 //nolint
  4. import (
  5. "fmt"
  6. "xorm.io/xorm"
  7. )
  8. func AddBranchProtectionCanPushAndEnableWhitelist(x *xorm.Engine) error {
  9. type ProtectedBranch struct {
  10. CanPush bool `xorm:"NOT NULL DEFAULT false"`
  11. EnableApprovalsWhitelist bool `xorm:"NOT NULL DEFAULT false"`
  12. ApprovalsWhitelistUserIDs []int64 `xorm:"JSON TEXT"`
  13. ApprovalsWhitelistTeamIDs []int64 `xorm:"JSON TEXT"`
  14. RequiredApprovals int64 `xorm:"NOT NULL DEFAULT 0"`
  15. }
  16. type User struct {
  17. ID int64 `xorm:"pk autoincr"`
  18. Type int
  19. // Permissions
  20. IsAdmin bool
  21. IsRestricted bool `xorm:"NOT NULL DEFAULT false"`
  22. Visibility int `xorm:"NOT NULL DEFAULT 0"`
  23. }
  24. type Review struct {
  25. ID int64 `xorm:"pk autoincr"`
  26. Official bool `xorm:"NOT NULL DEFAULT false"`
  27. ReviewerID int64 `xorm:"index"`
  28. IssueID int64 `xorm:"index"`
  29. }
  30. if err := x.Sync(new(ProtectedBranch)); err != nil {
  31. return err
  32. }
  33. if err := x.Sync(new(Review)); err != nil {
  34. return err
  35. }
  36. const (
  37. // ReviewTypeApprove approves changes
  38. ReviewTypeApprove int = 1
  39. // ReviewTypeReject gives feedback blocking merge
  40. ReviewTypeReject int = 3
  41. // VisibleTypePublic Visible for everyone
  42. VisibleTypePublic int = 0
  43. // VisibleTypePrivate Visible only for organization's members
  44. VisibleTypePrivate int = 2
  45. // unit.UnitTypeCode is unit type code
  46. UnitTypeCode int = 1
  47. // AccessModeNone no access
  48. AccessModeNone int = 0
  49. // AccessModeRead read access
  50. AccessModeRead int = 1
  51. // AccessModeWrite write access
  52. AccessModeWrite int = 2
  53. // AccessModeOwner owner access
  54. AccessModeOwner int = 4
  55. )
  56. // Repository represents a git repository.
  57. type Repository struct {
  58. ID int64 `xorm:"pk autoincr"`
  59. OwnerID int64 `xorm:"UNIQUE(s) index"`
  60. IsPrivate bool `xorm:"INDEX"`
  61. }
  62. type PullRequest struct {
  63. ID int64 `xorm:"pk autoincr"`
  64. BaseRepoID int64 `xorm:"INDEX"`
  65. BaseBranch string
  66. }
  67. // RepoUnit describes all units of a repository
  68. type RepoUnit struct {
  69. ID int64
  70. RepoID int64 `xorm:"INDEX(s)"`
  71. Type int `xorm:"INDEX(s)"`
  72. }
  73. type Permission struct {
  74. AccessMode int
  75. Units []*RepoUnit
  76. UnitsMode map[int]int
  77. }
  78. type TeamUser struct {
  79. ID int64 `xorm:"pk autoincr"`
  80. TeamID int64 `xorm:"UNIQUE(s)"`
  81. UID int64 `xorm:"UNIQUE(s)"`
  82. }
  83. type Collaboration struct {
  84. ID int64 `xorm:"pk autoincr"`
  85. RepoID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"`
  86. UserID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"`
  87. Mode int `xorm:"DEFAULT 2 NOT NULL"`
  88. }
  89. type Access struct {
  90. ID int64 `xorm:"pk autoincr"`
  91. UserID int64 `xorm:"UNIQUE(s)"`
  92. RepoID int64 `xorm:"UNIQUE(s)"`
  93. Mode int
  94. }
  95. type TeamUnit struct {
  96. ID int64 `xorm:"pk autoincr"`
  97. OrgID int64 `xorm:"INDEX"`
  98. TeamID int64 `xorm:"UNIQUE(s)"`
  99. Type int `xorm:"UNIQUE(s)"`
  100. }
  101. // Team represents a organization team.
  102. type Team struct {
  103. ID int64 `xorm:"pk autoincr"`
  104. OrgID int64 `xorm:"INDEX"`
  105. Authorize int
  106. }
  107. // getUserRepoPermission static function based on issues_model.IsOfficialReviewer at 5d78792385
  108. getUserRepoPermission := func(sess *xorm.Session, repo *Repository, user *User) (Permission, error) {
  109. var perm Permission
  110. repoOwner := new(User)
  111. has, err := sess.ID(repo.OwnerID).Get(repoOwner)
  112. if err != nil || !has {
  113. return perm, err
  114. }
  115. // Prevent strangers from checking out public repo of private organization
  116. // Allow user if they are collaborator of a repo within a private organization but not a member of the organization itself
  117. hasOrgVisible := true
  118. // Not SignedUser
  119. if user == nil {
  120. hasOrgVisible = repoOwner.Visibility == VisibleTypePublic
  121. } else if !user.IsAdmin {
  122. hasMemberWithUserID, err := sess.
  123. Where("uid=?", user.ID).
  124. And("org_id=?", repoOwner.ID).
  125. Table("org_user").
  126. Exist()
  127. if err != nil {
  128. hasOrgVisible = false
  129. }
  130. if (repoOwner.Visibility == VisibleTypePrivate || user.IsRestricted) && !hasMemberWithUserID {
  131. hasOrgVisible = false
  132. }
  133. }
  134. isCollaborator, err := sess.Get(&Collaboration{RepoID: repo.ID, UserID: user.ID})
  135. if err != nil {
  136. return perm, err
  137. }
  138. if repoOwner.Type == 1 && !hasOrgVisible && !isCollaborator {
  139. perm.AccessMode = AccessModeNone
  140. return perm, err
  141. }
  142. var units []*RepoUnit
  143. if err := sess.Where("repo_id = ?", repo.ID).Find(&units); err != nil {
  144. return perm, err
  145. }
  146. perm.Units = units
  147. // anonymous visit public repo
  148. if user == nil {
  149. perm.AccessMode = AccessModeRead
  150. return perm, err
  151. }
  152. // Admin or the owner has super access to the repository
  153. if user.IsAdmin || user.ID == repo.OwnerID {
  154. perm.AccessMode = AccessModeOwner
  155. return perm, err
  156. }
  157. accessLevel := func(user *User, repo *Repository) (int, error) {
  158. mode := AccessModeNone
  159. var userID int64
  160. restricted := false
  161. if user != nil {
  162. userID = user.ID
  163. restricted = user.IsRestricted
  164. }
  165. if !restricted && !repo.IsPrivate {
  166. mode = AccessModeRead
  167. }
  168. if userID == 0 {
  169. return mode, nil
  170. }
  171. if userID == repo.OwnerID {
  172. return AccessModeOwner, nil
  173. }
  174. a := &Access{UserID: userID, RepoID: repo.ID}
  175. if has, err := sess.Get(a); !has || err != nil {
  176. return mode, err
  177. }
  178. return a.Mode, nil
  179. }
  180. // plain user
  181. perm.AccessMode, err = accessLevel(user, repo)
  182. if err != nil {
  183. return perm, err
  184. }
  185. // If Owner is no Org
  186. if repoOwner.Type != 1 {
  187. return perm, err
  188. }
  189. perm.UnitsMode = make(map[int]int)
  190. // Collaborators on organization
  191. if isCollaborator {
  192. for _, u := range units {
  193. perm.UnitsMode[u.Type] = perm.AccessMode
  194. }
  195. }
  196. // get units mode from teams
  197. var teams []*Team
  198. err = sess.
  199. Join("INNER", "team_user", "team_user.team_id = team.id").
  200. Join("INNER", "team_repo", "team_repo.team_id = team.id").
  201. Where("team.org_id = ?", repo.OwnerID).
  202. And("team_user.uid=?", user.ID).
  203. And("team_repo.repo_id=?", repo.ID).
  204. Find(&teams)
  205. if err != nil {
  206. return perm, err
  207. }
  208. // if user in an owner team
  209. for _, team := range teams {
  210. if team.Authorize >= AccessModeOwner {
  211. perm.AccessMode = AccessModeOwner
  212. perm.UnitsMode = nil
  213. return perm, err
  214. }
  215. }
  216. for _, u := range units {
  217. var found bool
  218. for _, team := range teams {
  219. var teamU []*TeamUnit
  220. var unitEnabled bool
  221. err = sess.Where("team_id = ?", team.ID).Find(&teamU)
  222. for _, tu := range teamU {
  223. if tu.Type == u.Type {
  224. unitEnabled = true
  225. break
  226. }
  227. }
  228. if unitEnabled {
  229. m := perm.UnitsMode[u.Type]
  230. if m < team.Authorize {
  231. perm.UnitsMode[u.Type] = team.Authorize
  232. }
  233. found = true
  234. }
  235. }
  236. // for a public repo on an organization, a non-restricted user has read permission on non-team defined units.
  237. if !found && !repo.IsPrivate && !user.IsRestricted {
  238. if _, ok := perm.UnitsMode[u.Type]; !ok {
  239. perm.UnitsMode[u.Type] = AccessModeRead
  240. }
  241. }
  242. }
  243. // remove no permission units
  244. perm.Units = make([]*RepoUnit, 0, len(units))
  245. for t := range perm.UnitsMode {
  246. for _, u := range units {
  247. if u.Type == t {
  248. perm.Units = append(perm.Units, u)
  249. }
  250. }
  251. }
  252. return perm, err
  253. }
  254. // isOfficialReviewer static function based on 5d78792385
  255. isOfficialReviewer := func(sess *xorm.Session, issueID int64, reviewer *User) (bool, error) {
  256. pr := new(PullRequest)
  257. has, err := sess.ID(issueID).Get(pr)
  258. if err != nil {
  259. return false, err
  260. } else if !has {
  261. return false, fmt.Errorf("PullRequest for issueID %d not exist", issueID)
  262. }
  263. baseRepo := new(Repository)
  264. has, err = sess.ID(pr.BaseRepoID).Get(baseRepo)
  265. if err != nil {
  266. return false, err
  267. } else if !has {
  268. return false, fmt.Errorf("baseRepo with id %d not exist", pr.BaseRepoID)
  269. }
  270. protectedBranch := new(ProtectedBranch)
  271. has, err = sess.Where("repo_id=? AND branch_name=?", baseRepo.ID, pr.BaseBranch).Get(protectedBranch)
  272. if err != nil {
  273. return false, err
  274. }
  275. if !has {
  276. return false, nil
  277. }
  278. if !protectedBranch.EnableApprovalsWhitelist {
  279. perm, err := getUserRepoPermission(sess, baseRepo, reviewer)
  280. if err != nil {
  281. return false, err
  282. }
  283. if len(perm.UnitsMode) == 0 {
  284. for _, u := range perm.Units {
  285. if u.Type == UnitTypeCode {
  286. return AccessModeWrite <= perm.AccessMode, nil
  287. }
  288. }
  289. return false, nil
  290. }
  291. return AccessModeWrite <= perm.UnitsMode[UnitTypeCode], nil
  292. }
  293. for _, id := range protectedBranch.ApprovalsWhitelistUserIDs {
  294. if id == reviewer.ID {
  295. return true, nil
  296. }
  297. }
  298. // isUserInTeams
  299. return sess.Where("uid=?", reviewer.ID).In("team_id", protectedBranch.ApprovalsWhitelistTeamIDs).Exist(new(TeamUser))
  300. }
  301. if _, err := x.Exec("UPDATE `protected_branch` SET `enable_whitelist` = ? WHERE enable_whitelist IS NULL", false); err != nil {
  302. return err
  303. }
  304. if _, err := x.Exec("UPDATE `protected_branch` SET `can_push` = `enable_whitelist`"); err != nil {
  305. return err
  306. }
  307. if _, err := x.Exec("UPDATE `protected_branch` SET `enable_approvals_whitelist` = ? WHERE `required_approvals` > ?", true, 0); err != nil {
  308. return err
  309. }
  310. var pageSize int64 = 20
  311. qresult, err := x.QueryInterface("SELECT max(id) as max_id FROM issue")
  312. if err != nil {
  313. return err
  314. }
  315. var totalIssues int64
  316. totalIssues, ok := qresult[0]["max_id"].(int64)
  317. if !ok {
  318. // If there are no issues at all we ignore it
  319. return nil
  320. }
  321. totalPages := totalIssues / pageSize
  322. executeBody := func(page, pageSize int64) error {
  323. // Find latest review of each user in each pull request, and set official field if appropriate
  324. reviews := []*Review{}
  325. if err := x.SQL("SELECT * FROM review WHERE id IN (SELECT max(id) as id FROM review WHERE issue_id > ? AND issue_id <= ? AND type in (?, ?) GROUP BY issue_id, reviewer_id)",
  326. page*pageSize, (page+1)*pageSize, ReviewTypeApprove, ReviewTypeReject).
  327. Find(&reviews); err != nil {
  328. return err
  329. }
  330. if len(reviews) == 0 {
  331. return nil
  332. }
  333. sess := x.NewSession()
  334. defer sess.Close()
  335. if err := sess.Begin(); err != nil {
  336. return err
  337. }
  338. var updated int
  339. for _, review := range reviews {
  340. reviewer := new(User)
  341. has, err := sess.ID(review.ReviewerID).Get(reviewer)
  342. if err != nil || !has {
  343. // Error might occur if user doesn't exist, ignore it.
  344. continue
  345. }
  346. official, err := isOfficialReviewer(sess, review.IssueID, reviewer)
  347. if err != nil {
  348. // Branch might not be proteced or other error, ignore it.
  349. continue
  350. }
  351. review.Official = official
  352. updated++
  353. if _, err := sess.ID(review.ID).Cols("official").Update(review); err != nil {
  354. return err
  355. }
  356. }
  357. if updated > 0 {
  358. return sess.Commit()
  359. }
  360. return nil
  361. }
  362. var page int64
  363. for page = 0; page <= totalPages; page++ {
  364. if err := executeBody(page, pageSize); err != nil {
  365. return err
  366. }
  367. }
  368. return nil
  369. }